Coder Social home page Coder Social logo

fhpcker's Introduction

Email Recon Tool - Educational Malware

plot

Disclaimer

This repository contains a tool intended strictly for educational and research purposes. It's a demonstration of the mechanics behind certain types of malware, specifically targeting Linux boot files. The use of this tool is at your own risk, and should only be in environments that are safe, legal, and ethical. The author(s) of this tool disclaim any responsibility for misuse, damages, or legal consequences resulting from its use.

Warning

This tool is potentially harmful. It simulates an email reconnaissance tool but carries a malicious payload that removes certain Linux boot files upon execution, leading to system restart and potential unbootability. It's designed to illustrate the risks of executing untrusted software and the importance of cybersecurity.

Usage Guidelines

  1. Environment: Use this tool only in a controlled, isolated LINUX environment, such as a virtual machine, without sensitive or personal data. Do not use on any production or personal systems.
  2. Execution: Upon running, the tool prompts for an email address as part of its simulated functionality.
  3. Malicious Payload: After email input, it modifies Linux boot files and initiates a system restart, demonstrating the payload's impact.
  4. Recovery: Post-execution, the system may experience boot issues. This tool is for those who understand the risks and are prepared to manage them.

Educational Objectives

  • To demonstrate the operation and impact of malware targeting system boot files.
  • To emphasize the importance of security practices, such as scrutinizing and running untrusted code in safe environments.
  • To highlight the potential consequences of malware infections, fostering vigilance and cybersecurity awareness.

Contribution

Contributions to this project should focus on enhancing its educational value and adhering to ethical guidelines. Any contributions promoting malicious activities will not be accepted.

Note

Before executing the Email Recon Tool, it is advised to create a snapshot of your Linux environment. This precautionary measure is essential due to the potentially harmful nature of the tool, which may lead to the deletion of critical Linux boot files. In the event of system unbootability or disruption caused by the tool's malicious payload, a snapshot ensures the ability to revert to a stable state and recover your system.

How to run?

  1. sudo git clone https://github.com/TrojanNinja/FHPCKER
  2. sudo chmod +x Email_Recon
  3. sudo ./Email_Recon

License

This tool is distributed under MIT License, permitting its use, modification, and distribution for educational and research purposes only.

fhpcker's People

Contributors

trojanninja avatar ahmadhanif12 avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.